Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    15-09-2021 20:06

General

  • Target

    93FE344BD0960DFBFCE8FD9C20127D1C75EC414E7A72B.exe

  • Size

    23KB

  • MD5

    37799e802b833bad50ef3267e495059c

  • SHA1

    6df1d946f3c0f81e0029546f15fa49b34c6af587

  • SHA256

    93fe344bd0960dfbfce8fd9c20127d1c75ec414e7a72b2e41fac998c7594327b

  • SHA512

    95d5bb9968e7631052cc7ded5b7b9117b406ef05f25b85ca24e0e66176d44a201a462c6458d7f579b2f31bcfd8db0f1895b1d972ca589919ff942ad4b9c35bfa

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Windows

C2

dr-mesho.ddns.net:5552

Mutex

999006ebf1e2e9a7848a18a5a49cb936

Attributes
  • reg_key

    999006ebf1e2e9a7848a18a5a49cb936

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93FE344BD0960DFBFCE8FD9C20127D1C75EC414E7A72B.exe
    "C:\Users\Admin\AppData\Local\Temp\93FE344BD0960DFBFCE8FD9C20127D1C75EC414E7A72B.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\codec.exe
      "C:\Users\Admin\AppData\Local\Temp\codec.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4628
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\codec.exe" "codec.exe" ENABLE
        3⤵
          PID:4680

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\codec.exe
      MD5

      37799e802b833bad50ef3267e495059c

      SHA1

      6df1d946f3c0f81e0029546f15fa49b34c6af587

      SHA256

      93fe344bd0960dfbfce8fd9c20127d1c75ec414e7a72b2e41fac998c7594327b

      SHA512

      95d5bb9968e7631052cc7ded5b7b9117b406ef05f25b85ca24e0e66176d44a201a462c6458d7f579b2f31bcfd8db0f1895b1d972ca589919ff942ad4b9c35bfa

    • C:\Users\Admin\AppData\Local\Temp\codec.exe
      MD5

      37799e802b833bad50ef3267e495059c

      SHA1

      6df1d946f3c0f81e0029546f15fa49b34c6af587

      SHA256

      93fe344bd0960dfbfce8fd9c20127d1c75ec414e7a72b2e41fac998c7594327b

      SHA512

      95d5bb9968e7631052cc7ded5b7b9117b406ef05f25b85ca24e0e66176d44a201a462c6458d7f579b2f31bcfd8db0f1895b1d972ca589919ff942ad4b9c35bfa

    • memory/4560-115-0x00000000023C0000-0x00000000023C1000-memory.dmp
      Filesize

      4KB

    • memory/4628-116-0x0000000000000000-mapping.dmp
    • memory/4628-119-0x0000000000D50000-0x0000000000D51000-memory.dmp
      Filesize

      4KB

    • memory/4680-120-0x0000000000000000-mapping.dmp